Static task
static1
Behavioral task
behavioral1
Sample
ece5317e8b4ab779f311cd10c13069a3_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ece5317e8b4ab779f311cd10c13069a3_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ece5317e8b4ab779f311cd10c13069a3_JaffaCakes118
-
Size
199KB
-
MD5
ece5317e8b4ab779f311cd10c13069a3
-
SHA1
5cfe527cb3400a3ac218fcfca86d3fb9bfc73ec0
-
SHA256
76cc74894255a1c05afde11c66aa62317b87f6b241d664f68ebe46fa0b317eb3
-
SHA512
01fdcf81e1021b69d38edad09a52175342868809a25e6433c35b8b0d498d92905b64197c3a5828badf3ba11e8d812f2c0e630bdf840300d7098524a7649708a5
-
SSDEEP
3072:KsAFip1FWPL2tC846KlrHBvtZRCOPHRPDZfgIHOwxw+owOSFmaQiHUyokM:xx6PshKl1v3RPHRhfxw3wj4i0yoX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ece5317e8b4ab779f311cd10c13069a3_JaffaCakes118
Files
-
ece5317e8b4ab779f311cd10c13069a3_JaffaCakes118.exe windows:4 windows x86 arch:x86
619be8ff33bd65a77d9d76a21b424267
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryExA
lstrcatW
lstrcmpW
QueryPerformanceFrequency
GetAtomNameW
ExitProcess
GetTempFileNameW
GetCurrentProcess
CreateMutexW
GetExpandedNameW
GetSystemDirectoryA
SetErrorMode
OpenWaitableTimerW
ReplaceFileW
GetLocalTime
SetUnhandledExceptionFilter
GetProcAddress
DosDateTimeToFileTime
GetWindowsDirectoryA
GlobalDeleteAtom
GetVolumeInformationA
lstrlen
IsBadWritePtr
CopyFileA
CreateSemaphoreA
LoadLibraryA
lstrcpynW
lstrcmpi
RaiseException
lstrcmpiW
HeapCreate
lstrcpy
EnumCalendarInfoA
SleepEx
OpenFile
user32
GetMenuStringA
GetMenuInfo
CreateDesktopW
SetWindowTextW
GetClassInfoW
GetDlgItemInt
WinHelpW
SendDlgItemMessageW
TrackPopupMenu
MessageBoxIndirectW
WaitForInputIdle
GetForegroundWindow
SetDlgItemTextW
CreateMenu
GetCapture
EnumWindows
CharNextW
MoveWindow
SetTimer
CharNextA
IsIconic
CreateDialogParamW
GetSystemMetrics
LoadMenuIndirectW
DialogBoxParamW
GetMenuStringW
IsWindowEnabled
IsMenu
RegisterClassW
GetMessageW
LoadMenuIndirectA
CharPrevW
CopyIcon
CheckMenuItem
gdi32
CreatePolyPolygonRgn
RemoveFontResourceExA
CreateFontIndirectA
SetWinMetaFileBits
SetMetaFileBitsEx
RemoveFontResourceExW
CreateColorSpaceA
CreateMetaFileW
StretchDIBits
advapi32
FlushTraceW
FileEncryptionStatusA
QueryServiceConfig2W
AccessCheckByTypeResultListAndAuditAlarmByHandleA
QueryServiceStatus
RegCreateKeyW
InitializeSid
RegSaveKeyExW
BuildImpersonateExplicitAccessWithNameW
SaferIdentifyLevel
IsTextUnicode
RegEnumKeyExW
IsWellKnownSid
WmiNotificationRegistrationA
EncryptedFileKeyInfo
CloseServiceHandle
shell32
StrCmpNW
SHGetDataFromIDListA
SHBrowseForFolder
StrRStrIW
ole32
CoCreateGuid
StringFromCLSID
CoDeactivateObject
CoGetCallerTID
CoDisconnectObject
inetcomm
HrGetLastOpenFileDirectory
MimeEditDocumentFromStream
EssSignCertificateDecodeEx
EssKeyExchPreferenceDecodeEx
MimeOleGetPropA
MimeOleCreateVirtualStream
MimeOleEncodeHeader
HrGetLastOpenFileDirectoryW
EssKeyExchPreferenceEncodeEx
MimeOleGetFileInfoW
MimeOleSetBodyPropW
sqlunirl
_GetKerningPairs_@12
_OpenSemaphore_@12
_CopyFileEx_@24
_CreateFont@56
_RegCreateKey_@12
_GetKeyboardLayoutName_@4
_GetPrivateProfileSection_@16
_GetTabbedTextExtent_@20
_GetUserObjectInformation_@20
_CallMsgFilter_@8
_GetTempPath_@8
_SHGetFileInfo_@20
_SendNotifyMessage_@16
_SetUserObjectInformation_@16
_CharNext_@4
_GetDateFormat_@24
wsock32
ioctlsocket
getsockopt
ntohl
SetServiceA
EnumProtocolsA
gethostbyname
GetNameByTypeW
accept
WSAAsyncGetServByPort
MigrateWinsockConfiguration
gethostname
getsockname
select
ntohs
WSApSetPostRoutine
WSASetBlockingHook
rcmd
WSACleanup
GetNameByTypeA
GetAddressByNameA
TransmitFile
WSAIsBlocking
Sections
.QkHgz Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.YkG Size: 2KB - Virtual size: 334KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ORHtgX Size: 2KB - Virtual size: 468KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.e Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vTo Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.usRxZG Size: 4KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.anijq Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.aPns Size: 17KB - Virtual size: 250KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tUEgGN Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ